Improving memory encryption performance in secure processors

被引:34
作者
Yang, J [1 ]
Gao, L
Zhang, YT
机构
[1] Univ Calif Riverside, Dept Comp Sci & Engn, Riverside, CA 92521 USA
[2] Univ Texas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
memory design; hardware/software protection; security and protection;
D O I
10.1109/TC.2005.80
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation is that, other than the processor, any component is vulnerable to security attacks. Recently, an execution only memory (XOM) architecture has been proposed to support copy and tamper resistant software. In this design, the program and data are stored in an encrypted format outside the CPU boundary. The decryption is carried out after they are fetched from memory and before they are used by the CPU. As a result, the lengthened critical path causes a serious performance degradation. In this paper, we present an innovative technique in which the cryptography computation is shifted off from the memory access critical path. We propose using a different encryption scheme, namely, "pseudo-one-time pad" encryption, to produce the instructions and data ciphertext. With some additional on-chip storage, cryptography computations are carried in parallel with memory accesses, minimizing the performance penalty. We performed experiments to study the trade-off between storage size and performance penalty. Our technique reduces the performance overhead from 20.79 percent to 1.28 percent on average for reasonably sized (64KB) on-chip storage.
引用
收藏
页码:630 / 640
页数:11
相关论文
共 24 条
  • [1] [Anonymous], 6 ANN BSA GLOB SOFTW
  • [2] [Anonymous], TR701 RSA
  • [3] [Anonymous], 1989, SECURITY COMPUTER NE
  • [4] BURGER D., 1997, SIMPLESCALAR TOOL SE
  • [5] BURKE J, 2000, P ACM 9 INT C ARCH S
  • [6] Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    Collberg, CS
    Thomborson, C
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (08) : 735 - 746
  • [7] *DES, 1993, 462 DES
  • [8] EBERLE H, 1992, P IEEE CUSTOM INTEGR
  • [9] Gassend B., 2003, P 9 INT S HIGH PERFO
  • [10] Gilmont T., 1999, Proceedings 25th EUROMICRO Conference. Informatics: Theory and Practice for the New Millennium, P449, DOI 10.1109/EURMIC.1999.794507